General

  • Target

    7z2406-x64.exe

  • Size

    1.5MB

  • Sample

    240618-n3lexawgrp

  • MD5

    d8af785ca5752bae36e8af5a2f912d81

  • SHA1

    54da15671ad8a765f3213912cba8ebd8dac1f254

  • SHA256

    6220bbe6c26d87fc343e0ffa4e20ccfafeca7dab2742e41963c40b56fb884807

  • SHA512

    b635b449f49aac29234f677e662be35f72a059401ea0786d956485d07134f9dd10ed284338503f08ff7aad16833cf034eb955ca34e1faf35a8177ccad1f20c75

  • SSDEEP

    49152:6E+lvaQr7omhpcibOw1eLmz6O92u3RtRj08+Z3bG:6EzQ3/hdSzLVO92uTRmZy

Malware Config

Targets

    • Target

      7z2406-x64.exe

    • Size

      1.5MB

    • MD5

      d8af785ca5752bae36e8af5a2f912d81

    • SHA1

      54da15671ad8a765f3213912cba8ebd8dac1f254

    • SHA256

      6220bbe6c26d87fc343e0ffa4e20ccfafeca7dab2742e41963c40b56fb884807

    • SHA512

      b635b449f49aac29234f677e662be35f72a059401ea0786d956485d07134f9dd10ed284338503f08ff7aad16833cf034eb955ca34e1faf35a8177ccad1f20c75

    • SSDEEP

      49152:6E+lvaQr7omhpcibOw1eLmz6O92u3RtRj08+Z3bG:6EzQ3/hdSzLVO92uTRmZy

    • Event Triggered Execution: Component Object Model Hijacking

      Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

MITRE ATT&CK Matrix ATT&CK v13

Persistence

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Privilege Escalation

Event Triggered Execution

1
T1546

Component Object Model Hijacking

1
T1546.015

Discovery

Query Registry

3
T1012

System Information Discovery

2
T1082

Tasks